-
Updated
Jul 30, 2021 - Shell
security-tools
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 2,222 public repositories matching this topic...
-
Updated
Aug 1, 2021 - Go
-
Updated
Aug 4, 2021 - JavaScript
Gitleaks is missing quite a few rules for the Microsoft ecosystem, including Visual Studio, Azure and Azure DevOps.
Microsoft used to have a competing product called credscan
, but it was recently deprecated in favor of the GitHub Security offerings.
I've ported most of the rules from credscan to the gitleaks format and put them in a repo here:
https://github.com/jessehouwing/gitleaks-azur
Hi & welcome to Scapy's github ! This page lists issues that you can try to fix if you want to start contributing to Scapy.
This list includes wishes and things added by the maintainers based on the issues that we get, but also issues marked with TODO
or XXX
that already exist in Scapy's code base (layers). If you want to contribute to the project you might just take care one of the bugs.
-
Updated
Jul 20, 2021 - Python
-
Updated
Aug 2, 2021 - Ruby
-
Updated
Jul 31, 2021 - Shell
-
Updated
Aug 5, 2021 - Python
-
Updated
Aug 4, 2021 - Go
RustScan has an accessible mode, rustscan --accessible
which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible
a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!]
[~]
[>]
| {}
If any of these characters appear in any of the tests, fail the CI. E
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
README translations
-
Updated
Jul 29, 2021 - C#
-
Updated
Aug 2, 2021 - Shell
-
Updated
Aug 5, 2021 - Go
-
Updated
Jul 14, 2021 - Go
-
Updated
Feb 10, 2021 - Shell
Describe the bug
In the docs found here:
https://bandit.readthedocs.io/en/latest/plugins/index.html#complete-test-plugin-listing
B109 and B111 show a description instead of a plugin name. This looks inconsistent since all the other plugin names are listed. I believe this is a result of a recent change to remove these deprecated plugins.
To Reproduce
- Navigate to https://bandit
-
Updated
Jul 2, 2021 - Go
-
Updated
Jul 8, 2021
What would you like to be added
I'd like to have the option to not have the HSM pin stored in a configuration file, but instead be required to be entered manually by an operator each time the CA is started.
Why this is needed
Having HSM pins sitting on the file system weakens the security in cases of hardware being stolen.
In theory if the PIN is not known then stealing a server a
-
Updated
Jun 30, 2021 - Ruby
-
Updated
Jun 10, 2021 - Python
-
Updated
Aug 4, 2021 - Python
-
Updated
Jul 17, 2021 - Shell
-
Updated
Jun 30, 2021 - Python
-
Updated
Jul 15, 2021 - C#
Is there a way to skip the nmap scan and go straight to the attacking routes? In case i already know the target list is full of open rtsp port IPs.
Create a Webhook integration with Slack for new policy request notifications similarly to what exists inside Netflix.
- Wikipedia
- Wikipedia
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g.
rake.gemspec
has the information aboutrake
.To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*